SlideShare a Scribd company logo
1 of 37
SEMINAR ON:
1
WHAT IS GOOGLE WEB RANGER PROGRAMME?
 “Web Rangers equips students to become
ambassadors who will promote safe and
responsible use of the web in their schools.”
 Web Rangers provide training to help teens
create their cyber safety campaign to
enable themselves and their peers think
about their online behavior and how to keep
each other safe online.
2
CONTENTS:
1. Become an online sleuth.
2. Manage your digital foot prints
3. Cyber Bully
4. Scams
3
CHAPTER 1:-
BECOME AN ONLINE SLEUTH
 Investigate source.
 Who holds the copy right?
 What do they want you to
believe?
 Don’t be fooled by cool and
professional looking websites.
 Compare source of Information.
4
BECOME AN ONLINE SLEUTH
 Everyone’s face is hidden.
 Unless you know your
friend’s costume (Online
name), you don’t know if you
are talking to your friend or
someone you don’t know.
 Any stranger can pretend to
be a friend and you have no
way of knowing who they are
because they are behind the
mask of the computer
5
IDENTIFY FAKE PHOTO #1
6
IDENTIFY FAKE PHOTO #2
7
IDENTIFY FAKE PHOTO #3
8
IDENTIFY FAKE PHOTO #4
9
IDENTIFY FAKE PHOTO #5
10
CHAPTER 2:-
MANAGE YOUR DIGITAL FOOTPRINTS
 Think before you share.
 What you share can take on a
life of its own
 1 Share X 2.4 Billion People =?
11
STEPS TO SAFETY
 Search your name and evaluate your
reputation.
 Keep personal information private.
(User Id, Bank A/c No… etc.)
 Keep Granma Rule when posting
anything online.
12
PROTECT YOUR STUFF
 Use strong password.
 Never share your password.
 Lock your device / screen after use.
 Logout in proper way (Especially form public
computers)
 Know and use your settings. (Smartphone/
Computer)
 Use strict privacy settings. (Protect your mobile/
computer from Spyware)
 Use Incognito Mode when using a public computer.
13
TRACING DIGITAL FOOTPRINTS:
14
OPENING INCOGNITO MODE
(PRIVATE WINDOW)
15
PASSWORD :
 Use 8+ Characters.
 Mix letters, Numbers, and symbols.
 Use different passwords for different websites.
(Never use same password for every account)
 Use 2 step verification.
 Use complicated pattern lock for your smart phone
16
CHAPTER 3:-
CYBER BULLYING
The use of Internet to
bully (Hurt) a person,
typically by sending
messages of an
intimidating or
threatening nature.
17
INCASE OF BULLY:
Block and report
bully
Don’t respond or
retaliate
Reach out for help
Be civil and never bully.
Be a up stander not a by stander.
18
CHAPTER4:-
AVOID SCAMS
 Identity theft.
 Using your identity for crime
 Sell your details
 Track and steal you.
 Phishing
19
PHISHING
The luring of an internet
user to reveal personal
details (like passwords and
credit card information) on
a fake web page or e-mail.
20
PHISHING
21
TIPS:
 Don’t respond to suspicious posts/ e-mail.
 Don’t respond to request for your password.
 Ask parents.
22
QUIZ TIME: #1
If someone online tells you they are in
6th grade and their name is Katie, they
are probably how old?
 There’s no way to tell!
 12
 13
 35 23
QUIZ TIME: #2
 If you have been talking on the Internet to a
person for a long time, and they want to meet,
which is okay to do?
a) Meet them, as long as you bring a friend.
b) Ask your parent or guardian first and have
them go with you.
c) Meet them without asking elders.
d) Tell someone where you will be before you
go.
24
QUIZ TIME: #3
If someone online sends you a
message that is mean or makes you
feel uncomfortable, you should:
 Tell a responsible adult
 Erase them from your friends list.
 Delete the message.
 Insult them back
25
QUIZ TIME: #4
Which password is best to have??
a) soniyamol
b) Abcdef
c) 50niy@m0l
d) 9895646594
26
QUIZ TIME : #5
While surfing the Internet, you get an
error message from your Internet
provider, and it says it will delete your
account unless you type in your
password again, should you send the
information?
a. Yes.
b. No. 27
QUIZ TIME : #6
An example of cyber bullying is:
a) Posting your own information on the
internet.
b) Spreading rumors about someone
through e-mails or social network
sites.
c) Creating Facebook/ twitter account.
d) Responding to a harassing e-mail
28
QUIZ TIME : #7
 . When you are filling out forms or surveys
online, you should:
a) Answer all the questions truthfully.
b) Before you answer any questions, you should
get your parents' approval.
c) Make up funny answers to all the questions.
29
QUIZ TIME : #8
 When you get an email or instant message from
people you don't know, you should:
a) Ignore it and put it in your trash folder.
b) Respond with a polite how-do-you-do.
c) Forward the message to your best friends
30
QUIZ TIME : #9
 3. When someone asks for personal information
like phone numbers or addresses online, you
should:
a) Give the information to anyone who asks because it's
the polite thing to do.
b) Post the information on any public Web site like
MySpace, so anyone can find it.
c) Never give out personal information online in
emails or instant messages because you never
know who you are really communicating with. 31
QUIZ TIME : #10
 When you are making up a user name for email
and instant messaging, you should:
a) Always use your real name.
b) Use a name that does NOT reveal your true
identity.
c) Use a name that gives good clues about who you
really are.
32
QUIZ TIME :#11
Identify this person :
33
QUIZ TIME : #12
Who is the IB (information and broadcasting) minister
?
o Narendra modhi
o Manohar Parrikar
o Smriti Irani
o Arun Jaitley
34
WHAT IS YOUR DUTY?
Follow the safety guidelines
Practice it properly
Educate your friends and family.
Write an article to publish in the school
magazine, local news papers etc.
35
TIME
36
37

More Related Content

What's hot

Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying Presentation
Courtney Cole
 
Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide share
br03wood
 
Bully presentation
Bully presentationBully presentation
Bully presentation
jay mckey
 

What's hot (20)

Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Facebook
FacebookFacebook
Facebook
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber Crime & Its Effect on Youth
Cyber Crime & Its Effect on YouthCyber Crime & Its Effect on Youth
Cyber Crime & Its Effect on Youth
 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying Presentation
 
Social engineering hacking attack
Social engineering hacking attackSocial engineering hacking attack
Social engineering hacking attack
 
Phishing.pdf
Phishing.pdfPhishing.pdf
Phishing.pdf
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Bullying Is Not Cool
Bullying Is Not CoolBullying Is Not Cool
Bullying Is Not Cool
 
Presentation -- CYBERBULLYING
Presentation  -- CYBERBULLYINGPresentation  -- CYBERBULLYING
Presentation -- CYBERBULLYING
 
Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide share
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety Presentation
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Bully presentation
Bully presentationBully presentation
Bully presentation
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber Safety ppt.pptx
Cyber Safety ppt.pptxCyber Safety ppt.pptx
Cyber Safety ppt.pptx
 
Safe Computing
Safe ComputingSafe Computing
Safe Computing
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptx
 

Similar to How to use internet safely

Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
guest5558240
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
guest0c7b65
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
guest0c7b65
 
Mac Kenzi D. Group#3
Mac Kenzi D. Group#3Mac Kenzi D. Group#3
Mac Kenzi D. Group#3
guest3e462b5
 
Internet Saftey Final
Internet Saftey FinalInternet Saftey Final
Internet Saftey Final
guest252cc9
 
Q3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdfQ3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdf
BryanSmile
 
Internet safety
Internet safetyInternet safety
Internet safety
kohlerj
 

Similar to How to use internet safely (20)

Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 
online safety, security and netiquette.pdf
online safety, security and netiquette.pdfonline safety, security and netiquette.pdf
online safety, security and netiquette.pdf
 
Mac Kenzi D. Group#3
Mac Kenzi D. Group#3Mac Kenzi D. Group#3
Mac Kenzi D. Group#3
 
Internet Saftey Final
Internet Saftey FinalInternet Saftey Final
Internet Saftey Final
 
INTERNET SAFETY
INTERNET SAFETY INTERNET SAFETY
INTERNET SAFETY
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Student book key unit3
Student book key unit3Student book key unit3
Student book key unit3
 
Raising A Cyber Citizen
Raising A Cyber CitizenRaising A Cyber Citizen
Raising A Cyber Citizen
 
Digital literacy
Digital literacyDigital literacy
Digital literacy
 
Q3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdfQ3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdf
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber Crime Awareness and Prevension.pdf
Cyber Crime Awareness and Prevension.pdfCyber Crime Awareness and Prevension.pdf
Cyber Crime Awareness and Prevension.pdf
 
Tech Class Millionaire For Internet Safety
Tech Class Millionaire For Internet SafetyTech Class Millionaire For Internet Safety
Tech Class Millionaire For Internet Safety
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Internet safety
Internet safety Internet safety
Internet safety
 
Maintaining Online Privacy
Maintaining Online PrivacyMaintaining Online Privacy
Maintaining Online Privacy
 
Presentation on the optimal usage of facebook
Presentation on the optimal usage of facebookPresentation on the optimal usage of facebook
Presentation on the optimal usage of facebook
 

Recently uploaded

QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
httgc7rh9c
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
EADTU
 

Recently uploaded (20)

80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Play hard learn harder: The Serious Business of Play
Play hard learn harder:  The Serious Business of PlayPlay hard learn harder:  The Serious Business of Play
Play hard learn harder: The Serious Business of Play
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use Cases
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 

How to use internet safely

  • 2. WHAT IS GOOGLE WEB RANGER PROGRAMME?  “Web Rangers equips students to become ambassadors who will promote safe and responsible use of the web in their schools.”  Web Rangers provide training to help teens create their cyber safety campaign to enable themselves and their peers think about their online behavior and how to keep each other safe online. 2
  • 3. CONTENTS: 1. Become an online sleuth. 2. Manage your digital foot prints 3. Cyber Bully 4. Scams 3
  • 4. CHAPTER 1:- BECOME AN ONLINE SLEUTH  Investigate source.  Who holds the copy right?  What do they want you to believe?  Don’t be fooled by cool and professional looking websites.  Compare source of Information. 4
  • 5. BECOME AN ONLINE SLEUTH  Everyone’s face is hidden.  Unless you know your friend’s costume (Online name), you don’t know if you are talking to your friend or someone you don’t know.  Any stranger can pretend to be a friend and you have no way of knowing who they are because they are behind the mask of the computer 5
  • 11. CHAPTER 2:- MANAGE YOUR DIGITAL FOOTPRINTS  Think before you share.  What you share can take on a life of its own  1 Share X 2.4 Billion People =? 11
  • 12. STEPS TO SAFETY  Search your name and evaluate your reputation.  Keep personal information private. (User Id, Bank A/c No… etc.)  Keep Granma Rule when posting anything online. 12
  • 13. PROTECT YOUR STUFF  Use strong password.  Never share your password.  Lock your device / screen after use.  Logout in proper way (Especially form public computers)  Know and use your settings. (Smartphone/ Computer)  Use strict privacy settings. (Protect your mobile/ computer from Spyware)  Use Incognito Mode when using a public computer. 13
  • 16. PASSWORD :  Use 8+ Characters.  Mix letters, Numbers, and symbols.  Use different passwords for different websites. (Never use same password for every account)  Use 2 step verification.  Use complicated pattern lock for your smart phone 16
  • 17. CHAPTER 3:- CYBER BULLYING The use of Internet to bully (Hurt) a person, typically by sending messages of an intimidating or threatening nature. 17
  • 18. INCASE OF BULLY: Block and report bully Don’t respond or retaliate Reach out for help Be civil and never bully. Be a up stander not a by stander. 18
  • 19. CHAPTER4:- AVOID SCAMS  Identity theft.  Using your identity for crime  Sell your details  Track and steal you.  Phishing 19
  • 20. PHISHING The luring of an internet user to reveal personal details (like passwords and credit card information) on a fake web page or e-mail. 20
  • 22. TIPS:  Don’t respond to suspicious posts/ e-mail.  Don’t respond to request for your password.  Ask parents. 22
  • 23. QUIZ TIME: #1 If someone online tells you they are in 6th grade and their name is Katie, they are probably how old?  There’s no way to tell!  12  13  35 23
  • 24. QUIZ TIME: #2  If you have been talking on the Internet to a person for a long time, and they want to meet, which is okay to do? a) Meet them, as long as you bring a friend. b) Ask your parent or guardian first and have them go with you. c) Meet them without asking elders. d) Tell someone where you will be before you go. 24
  • 25. QUIZ TIME: #3 If someone online sends you a message that is mean or makes you feel uncomfortable, you should:  Tell a responsible adult  Erase them from your friends list.  Delete the message.  Insult them back 25
  • 26. QUIZ TIME: #4 Which password is best to have?? a) soniyamol b) Abcdef c) 50niy@m0l d) 9895646594 26
  • 27. QUIZ TIME : #5 While surfing the Internet, you get an error message from your Internet provider, and it says it will delete your account unless you type in your password again, should you send the information? a. Yes. b. No. 27
  • 28. QUIZ TIME : #6 An example of cyber bullying is: a) Posting your own information on the internet. b) Spreading rumors about someone through e-mails or social network sites. c) Creating Facebook/ twitter account. d) Responding to a harassing e-mail 28
  • 29. QUIZ TIME : #7  . When you are filling out forms or surveys online, you should: a) Answer all the questions truthfully. b) Before you answer any questions, you should get your parents' approval. c) Make up funny answers to all the questions. 29
  • 30. QUIZ TIME : #8  When you get an email or instant message from people you don't know, you should: a) Ignore it and put it in your trash folder. b) Respond with a polite how-do-you-do. c) Forward the message to your best friends 30
  • 31. QUIZ TIME : #9  3. When someone asks for personal information like phone numbers or addresses online, you should: a) Give the information to anyone who asks because it's the polite thing to do. b) Post the information on any public Web site like MySpace, so anyone can find it. c) Never give out personal information online in emails or instant messages because you never know who you are really communicating with. 31
  • 32. QUIZ TIME : #10  When you are making up a user name for email and instant messaging, you should: a) Always use your real name. b) Use a name that does NOT reveal your true identity. c) Use a name that gives good clues about who you really are. 32
  • 33. QUIZ TIME :#11 Identify this person : 33
  • 34. QUIZ TIME : #12 Who is the IB (information and broadcasting) minister ? o Narendra modhi o Manohar Parrikar o Smriti Irani o Arun Jaitley 34
  • 35. WHAT IS YOUR DUTY? Follow the safety guidelines Practice it properly Educate your friends and family. Write an article to publish in the school magazine, local news papers etc. 35
  • 37. 37